"A computer user will often make many decisions based on visual cues. An attacker may manipulate a user's course of action by using false visual cues. For instance, if a bogus dialog box is obtrusive and presented in a way that interferes with normal operation of the computer, the user may be coerced into taking an action intended by the attacker that is triggered by accepting or closing the box.